Skip to content

Commit 6e282d6

Browse files
author
Markus Vilcinskas
committed
mon78
1 parent 3d38823 commit 6e282d6

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/reports-monitoring/workbook-legacy authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ The sign-ins using legacy authentication workbook lets you see all legacy authen
5757

5858
## Sections
5959

60-
With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbooks highlights which legacy authentication protocols are used throughout your tenant.
60+
With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbook highlights which legacy authentication protocols are used throughout your tenant.
6161

62-
Gathering the required information, consists of three steps:
62+
The data collection consists of three steps:
6363

6464
1. Select a legacy authentication protocol, and then select an application to filter by users accessing that application.
6565

0 commit comments

Comments
 (0)